CN102394751B - One-time pad password system based on visual cryptography - Google Patents

One-time pad password system based on visual cryptography Download PDF

Info

Publication number
CN102394751B
CN102394751B CN 201110335563 CN201110335563A CN102394751B CN 102394751 B CN102394751 B CN 102394751B CN 201110335563 CN201110335563 CN 201110335563 CN 201110335563 A CN201110335563 A CN 201110335563A CN 102394751 B CN102394751 B CN 102394751B
Authority
CN
China
Prior art keywords
user
point
exploded view
password
mask artwork
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201110335563
Other languages
Chinese (zh)
Other versions
CN102394751A (en
Inventor
鲜明
董健
温沙蒙
张翔
卢哲俊
张权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN 201110335563 priority Critical patent/CN102394751B/en
Publication of CN102394751A publication Critical patent/CN102394751A/en
Application granted granted Critical
Publication of CN102394751B publication Critical patent/CN102394751B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a one-time pad password system based on visual cryptography. The technical scheme is that the one-time pad password system comprises a main-control module, an identity characteristic input interface, a visual information display terminal, a password input terminal and a plurality of subscriber masking pictures, wherein each subscriber masking picture corresponds to a subscriber; the identity characteristic input interface receives the identity characteristic data input of subscribers and sends the identity characteristic data input to the main-control module; the password input terminal receives the password input and sends the password input to the main-control module; the visual information display terminal receives visual cryptography subsidiary pictures sent by the main-control module and displays the visual cryptography subsidiary pictures to the subscribers; the subscribers place the possessed subscriber masking pictures on a first aligning frame to acquire the password P at the time; the main-control module comprises a master control program and a database; the main-control module takes a computer system as the platform and further comprises another master control program and another database to achieve subscriber register and authentication identification. The one-time pad password system provided by the invention can achieve safe, convenient andefficient subscriber identity authentication.

Description

One-time pad password system based on visual cryptography
Technical field
The invention belongs to information security field, more concretely, the present invention relates to a kind of password system with one-time pad characteristics that utilizes visual cryptography to realize.
Background technology
One width of cloth original image is resolved into the random subgraph of two width of cloth, because the randomness of decomposing, when utilizing people's vision to observe two width of cloth subgraphs, can't obtain any information of original image, it is impossible namely wanting to obtain original image information from single subgraph.Only have when two width of cloth subgraphs fully when superimposed, from the angle of visual effect, original image is just rebuilt.The technology of utilizing above-mentioned principle to be encrypted deciphering is visual cryptography, claims that usually two width of cloth subgraphs are the visual cryptography subgraph.Visual cryptography can be applied in information security field, carries out the authentication of validated user.
The method of using password to carry out authentication comprises static password mode and dynamic password mode.The static password mode is confirmed user's legitimacy by user name and the coupling of relative fixedly password.This authentication mode is because of the nature static of password and reuse, and has safety defects such as easily leaking, easily steal, easily guess, easily crack.The dynamic password mode comprises one-time pad password form, namely is to replace static password with one-time password, when each authentication, and random the generation when time password.This mode overcomes the various safety defects of traditional static password, so that the fail safe of verification process is greatly improved.
Realize one-time pad password form, maximum difficulty is that the password that generates during how with each authentication passes to validated user and learns, simultaneously in transmittance process, avoid losing, revealing, avoid loaded down with trivial details operation, for a long time wait, high a series of practical problems such as cost.
As previously mentioned, use visual cryptography can realize the one-time pad password.When each authentication, this password information is added in the original image of generation, namely utilize vision to observe and can from original image, obtain this password.The decrypted image that the user is held is as first visual cryptography subgraph, utilizes first visual cryptography subgraph and this to generate original image and obtains second visual cryptography subgraph, and show by display device.When the user operated, second visual cryptography subgraph on the decrypted image that oneself is held (i.e. first visual cryptography subgraph) and the display device stacked and reconstructs original image, read when time password of authentication.In the system that reality is used, can allow the user input again the password of this authentication, if password is correct, can finish this authentication.At present, the relevant data of utilizing visual cryptography to realize the one-time pad password system not yet retrieves.
Summary of the invention
The purpose of this invention is to provide a kind of one-time pad password system based on visual cryptography, finish safety, convenient, effective authenticating user identification.
Technical scheme of the present invention is: a kind of one-time pad password system based on visual cryptography comprises main control module, identity characteristic input interface, visual information display terminal, password input terminal, several user's mask artworks.Every corresponding user of user's mask artwork.
The identity characteristic input interface receives user's identity characteristic data input, sends to main control module.The password input terminal receives the password input, and sends to main control module.
The visual information display terminal receives the visual cryptography subgraph that main control module sends, and is shown to the user.User's mask artwork that the user will have is put on the first alignment frame, can obtain as time password P.
Main control module comprises primary control program and database.Main control module also comprises primary control program and database take computer system as platform, under the control of primary control program, and completing user registration and authentication identifying.Database is used for storage user's mask artwork and subscriber identity information.
When main control module is carried out user registration course: receive the identity characteristic data that the identity characteristic input interface sends, produce at random a width of cloth user mask artwork, deposit this user's mask artwork and user's identity characteristic data in database as this user's information together.Wherein, the process that produces a width of cloth user mask artwork is:
If six basic picture element matrixs are 0 0 1 1 , 0 1 0 1 , 0 1 1 0 , 1 1 0 0 , 1 0 1 0 , 1 0 0 1 , 0 pixel that represents black gray wherein, 1 represents the pixel of white gray;
As a foundation drawing point, then six basic picture element matrixs form six different foundation drawing points with each basic picture element matrix, and each foundation drawing point comprises 2 * 2 pixels.Choose at random any foundation drawing point and arrange, the image of generation is user's mask artwork.Each user allots user's mask artwork.
When main control module is carried out the authentication identifying, may further comprise the steps:
The first step: search user's mask artwork
The identity characteristic input interface receives the user identity feature, and the identity characteristic data of storing in this identity characteristic and the database are mated, and finds user's mask artwork W1 corresponding to this user identity feature.
Second step: generate associated picture
(1) step: generate original image
Random n (n is any positive integer) the position password that generates is designated as P.
If two original pixels matrixes are 1 1 1 1 , 0 0 0 0 . As an original graph point, then two original pixels matrixes form two different original graph points with each original pixels matrix, and each original graph point comprises 2 * 2 pixels.Wherein 1 1 1 1 Represent the original graph point of white, 0 0 0 0 Represent the original graph point of black.
Generate original image, original image is the 0-1 gray level image.Utilize vision to observe and to obtain password P from original image.
If comprising the zone of password P in the original image is effective range, effective range to be expanded, the expansion rule is: if the pixel in the effective range is the white pixel point, then expand the original graph point that becomes white, namely 1 1 1 1 ; If the pixel in the effective range is black pixel point, then expand the original graph point that becomes black, namely 0 0 0 0 . Effective range is expanded the rear image that forms be designated as effective image S.
(2) step: generate the visual cryptography subgraph
At first user's mask artwork W1 and effective image S are alignd.The concept of definition alignment unit is: an alignment unit refers to any one foundation drawing point in user's mask artwork W1, and an alignment unit refers to any one original graph point in effective image S.The rule of alignment is: when user's mask artwork W1 and effective image S were stacked, all alignment unit of effective image S all covered in the alignment unit of user's mask artwork W1.If after user's mask artwork W1 and the effective image S alignment, the closed curve that the borderline pixel of user's mask artwork W1 forms is the first alignment frame, is generally rectangle; The closed curve that the borderline pixel of effective image S forms is the second alignment frame, is generally rectangle, records the size of relative position W He each frame of two frames.By relative position W as can be known, the original graph point of the capable j row of effective image S i covers on the foundation drawing point of user's mask artwork W1 the i ' row j ' row, and is namely corresponding.
If expand picture element matrix and be for five 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 , 0 0 0 0 , Each is expanded picture element matrix as an exploded view point, then expand five exploded view points of picture element matrix formation for five, each exploded view point comprises 2 * 2 pixels.
If ten resolve a picture dot matrixes are 0 0 1 1 , 0 1 0 1 , 0 1 1 0 , 1 1 0 0 , 1 0 1 0 , 1 0 0 1 , 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 . As an exploded view point, then ten resolve a picture dot matrixes form ten exploded view points with each resolve a picture dot matrix, and each exploded view point comprises 2 * 2 pixels.
Utilize effective image S to generate the exploded view picture, the exploded view picture is made of the exploded view point, the create-rule of each exploded view point is: the original graph of the capable j row of effective image S i is put corresponding exploded view as the exploded view point of the capable j row of i, if the original graph point of the capable j row of effective image S i is the original graph point of white, then three pixels are black in the exploded view point of the capable j row of i, a pixel is white, and the position of white pixel point is in two white pixel point positions in foundation drawing point corresponding to user's mask artwork W1 the i ' row j ' row any one, chooses at random the white original graph point of qualified exploded view point replacement; Otherwise the original graph point of black is replaced to the exploded view point 0 0 0 0 .
Recycling exploded view picture and user's mask artwork W1 generate visual cryptography subgraph W2.Visual cryptography subgraph W2 is made of the exploded view point, with the exploded view point in the exploded view point replacement exploded view picture, the replacement condition satisfies: when the value of the value of corresponding pixel points and the exploded view point corresponding pixel points of the capable j row of visual cryptography subgraph W2 i multiplied each other in the alignment unit (foundation drawing point) of user's mask artwork W1 the i ' row j ' row, the result who obtains was the value of the corresponding pixel points of the exploded view point that is listed as of the capable j of exploded view picture correspondence i.
The 3rd step: check password
The first alignment frame is presented at VDT, presses relative position W and in the second alignment frame, show the visual cryptography subgraph.
The user who receives the transmission of password input terminal enters password.If the password of input is P, judge that then the user is validated user, the output legal information is to application system.Otherwise the output information unauthorized is to application system.
As a further improvement on the present invention, the highest in order to realize fail safe, can make simultaneously the utilance of user's mask artwork maximum, the length of original image is half of length of user's mask artwork, the width of original image is half of width of user's mask artwork.
Beneficial effect of the present invention is:
1. realization dynamic password.When the user carried out authentication at every turn, password P and original image all were random the generations, have uncertainty, therefore can realize the one-time pad dynamic password.
2. manner of decryption is simple.The present invention is when identifying user identity, and only utilizing vision is that naked eyes just can be decrypted acquisition password P.
3. safe.Utilize the visual cryptography subgraph of visual information display terminal output output, do not comprise any password information of original image output, the disabled user can't obtain password, and therefore output, use procedure are safe and reliable.
4. system provided by the invention utilizes prior art equipment to realize easily, have cost low, use simple characteristics.
Description of drawings
Fig. 1 is system provided by the invention theory of constitution schematic diagram;
Fig. 2 is the Principle of Process schematic diagram that comprises among the present invention;
Fig. 3 is user's mask artwork W1 that the present invention is used for the principle explanation;
Fig. 4 is the original image that the present invention is used for the principle explanation;
Fig. 5 is the effective image S that the present invention is used for the principle explanation
Fig. 6 is the exploded view picture that the present invention is used for the principle explanation;
Fig. 7 is the visual cryptography subgraph W2 that the present invention is used for the principle explanation;
Fig. 8 is user's mask artwork W1 that emulation experiment one of the present invention generates;
Fig. 9 is the visual cryptography subgraph W2 that emulation experiment one of the present invention generates;
Figure 10 is the exploded view picture that emulation experiment one of the present invention generates.
Embodiment
The present invention is described in detail below in conjunction with example.
Fig. 1 is system of the present invention theory of constitution schematic diagram, Fig. 2 is operating process schematic diagram of the present invention, Fig. 3 to Fig. 7 be utilize the specific embodiment of the present invention carry out for principle explanation the result, Fig. 8 to Figure 10 utilizes the specific embodiment of the present invention to carry out the result of emulation experiment one.
As shown in Figure 1, the one-time pad password system based on visual cryptography provided by the invention comprises main control module, identity characteristic input interface, visual information display terminal, password input terminal, several user's mask artworks.Main control module utilizes the equipment platforms such as computer or embedded system, single-chip microcomputer to realize.Main control module comprises primary control program and database, utilizes software to realize the function of primary control program, comprises that the user registers and authenticate identification.Database storage user's mask artwork data and identity characteristic data.The identity characteristic input interface is certain collecting device or certain Message Entry Device, gathers the user identity characteristic and sends to main control module; Therefore the user identity characteristic can be the information such as fingerprint, iris, vein, name, code.The visual information display terminal is image display, can be liquid crystal display screen, CRT monitor etc., and output visual cryptography subgraph is shown to the user.The password input terminal is the input equipments such as keyboard or touch-screen, receives the password of user's input, and sends to main control module.Each user allots user's mask artwork, and user's mask artwork is the piece image that is generated by main control module, and every user's mask artwork is not identical.
In user's use procedure, comprise that the user registers and authenticate two processes of identification.User registration course is shown in Fig. 2 (a), the user is at first by identity characteristic input interface input user identity characteristic, then by the identity characteristic interface identity characteristic data are sent to main control module, after main control module receives the identity characteristic data, generate and output user mask artwork.User's mask artwork of main control module output is printed on the translucent film, is preserved by the user.The authentication identifying is shown in Fig. 2 (b), the user is by identity characteristic input interface input identity characteristic data, main control module receive after these identity characteristic data with database in the identity characteristic data of storing mate, if the match is successful, find user's mask artwork W1 corresponding to this user identity feature; Then generate associated picture, comprise and generate original image and generate visual cryptography subgraph W2, wherein when generating the visual cryptography subgraph, generate the first alignment frame and the second alignment frame, record the size of two frame relative position W and each frame, from original image, can find out password P; The size of the visual cryptography subgraph W2 that generates and two frame relative position W and each frame sent be given to VDT, VDT shows the first alignment frame, press relative position W demonstration visual cryptography subgraph W2 in the second alignment frame; After the user sees visual cryptography subgraph W2, oneself user's mask artwork W1 is placed into the frame coincidence so that align with first in user's mask artwork border on the first alignment frame, can sees password P; The user is by the password input terminal P that enters password, and main control module is checked password and judged whether the user is validated user, and the output corresponding information is to application system.
Wherein, when generating user's mask artwork W1, choose at random the foundation drawing point and arrange, the image of generation is user's mask artwork.Be illustrated in figure 3 as for the principle explanation, utilize user's mask artwork W1 of 7 * 5=35 foundation drawing dot generation.
Wherein, when generating at random any n position password P, password can be numeral, upper and lower case letter or some additional characters.When carrying out illustrating for principle, generate at random n=1 position password, the random password that generates be digital " 8 ", i.e. P=8.
Wherein, when generating original image, call the corresponding template of numeral, letter or additional character in the password of generation (template is the image that numeral, letter or additional character that black picture element consists of are arranged), begin to take shape the framework of original image, then at the random filling in other zones monochrome pixels point, generate the image of a 0-1 gray scale, finally consist of original image, and want the utility vision can find out password P from original image.Be illustrated in figure 4 as the original image for the principle explanation, therefrom can clearly tell password P=8.When practical application, original image size to choose best resolution with existing display device identical, such as 640 * 480,1024 * 768 etc., the convenient so follow-up operation such as stack.If comprising the zone of password P in the original image is effective range, effective range to be expanded, the expansion rule is: if the pixel in the effective range is the white pixel point, then expand the original graph point that becomes white, namely 1 1 1 1 ; If the pixel in the effective range is black pixel point, then expand the original graph point that becomes black, namely 0 0 0 0 . Effective range is expanded the rear image that forms be designated as effective image S, as shown in Figure 5.
Wherein, when generating visual cryptography subgraph W2, at first be with user's mask artwork W1 and effective image S alignment.The concept of definition alignment unit is: an alignment unit refers to any one foundation drawing point in user's mask artwork W1, and an alignment unit refers to any one original graph point in effective image S.The rule of alignment is: when user's mask artwork W1 and effective image S were stacked, all alignment unit of effective image S all covered in the alignment unit of user's mask artwork W1.If after user's mask artwork W1 and the effective image S alignment, the closed curve that the borderline pixel of user's mask artwork W1 forms is the first alignment frame, is generally rectangle; The closed curve that the borderline pixel of effective image S forms is the second alignment frame, is generally rectangle, records the size of relative position W He each frame of two frames.By relative position W as can be known, the original graph point of the capable j row of effective image S i covers on the foundation drawing point of user's mask artwork W1 the i ' row j ' row, and is namely corresponding.In the experiment that is used for the principle explanation, the first alignment frame the measure-alike of frame that align with second all is 14 * 10, and i=1, j=1, i '=1, j '=1.
If expand picture element matrix and be for five 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 , 0 0 0 0 , Each is expanded picture element matrix as an exploded view point, then expand five exploded view points of picture element matrix formation for five, each exploded view point comprises 2 * 2 pixels.
If ten resolve a picture dot matrixes are 0 0 1 1 , 0 1 0 1 , 0 1 1 0 , 1 1 0 0 , 1 0 1 0 , 1 0 0 1 , 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 . As an exploded view point, then ten resolve a picture dot matrixes form ten exploded view points with each resolve a picture dot matrix, and each exploded view point comprises 2 * 2 pixels.
Utilize effective image S to generate the exploded view picture, the exploded view picture is made of the exploded view point, the create-rule of each exploded view point is: the original graph of the capable j row of effective image S i is put corresponding exploded view as the exploded view point of the capable j row of i, if the original graph point of the capable j row of effective image S i is the original graph point of white, then three pixels are black in the exploded view point of the capable j row of i, a pixel is white, and the position of white pixel point is in two white pixel point positions of corresponding foundation drawing point in foundation drawing point corresponding to user's mask artwork W1 the i ' row j ' row any one, chooses at random the white original graph point of qualified exploded view point replacement; Otherwise the original graph point of black is replaced to the exploded view point 0 0 0 0 . Shown in Figure 6 is the exploded view picture that generates for the principle explanation.Be used for the effective image S of principle explanation at Fig. 5, effective image S the 1st row the 1st row original graph point is 0 0 0 0 , Be the original graph point of black, then Fig. 6 is black for four pixels of the exploded view point of exploded view picture the 1st row the 1st row of principle explanation, is 0 0 0 0 ; Be used for the effective image S of principle explanation at Fig. 5, the 1st row the 2nd row original graph point is 1 1 1 1 , The foundation drawing point of namely white, and corresponding with effective image S user's mask artwork W1 the 1st row the 2nd row is 0 1 0 1 , Then the exploded view point of the 1st row the 2nd row can for 0 0 0 1 Or 0 1 0 0 , The exploded view point that Fig. 6 chooses at random for the exploded view picture of principle explanation is 0 1 0 0 .
Recycling exploded view picture and user's mask artwork W1 generate visual cryptography subgraph W2.Visual cryptography subgraph W2 is made of the exploded view point, with the exploded view point in the exploded view point replacement exploded view picture, the replacement condition satisfies: when the value of the value of corresponding pixel points and the exploded view point corresponding pixel points of the capable j row of visual cryptography subgraph W2 i multiplied each other in the alignment unit (foundation drawing point) of user's mask artwork W1 the i ' row j ' row, the result who obtains was the value of the corresponding pixel points of the exploded view point that is listed as of the capable j of exploded view picture correspondence i.Fig. 7 is the visual cryptography subgraph W2 for the principle explanation, puts corresponding exploded view such as the exploded view of visual cryptography subgraph W2 the 1st row the 1st row as the exploded view point that the 1st row the 1st is listed as to be 0 0 0 0 , The alignment unit (foundation drawing point) of the 1st row the 1st row is among the respective user mask artwork W1 0 0 1 1 , The exploded view point that then satisfies the replacement condition is the exploded view point that is listed as with visual cryptography subgraph W2 the 1st row the 1st 1 0 0 0 When respective pixel multiplies each other, namely 0 × 1 0 × 0 1 × 0 1 × 0 The result who obtains is that exploded view is as the exploded view point of the 1st row the 1st row 0 0 0 0 . Because in the experiment that is used for the principle explanation, the size of the first alignment frame, the second alignment frame, user's mask artwork W1, visual cryptography subgraph W2 is all identical, therefore the border of the first alignment frame, the second alignment frame, visual cryptography subgraph W2 all overlaps, covered the first alignment frame when in the second alignment frame, showing the visual cryptography subgraph.
Wherein, when checking password, the first alignment frame is presented at VDT, presses relative position W and in the second alignment frame, show the visual cryptography subgraph.The user who receives the transmission of password input terminal enters password.If the password of input is P, judge that then the user is validated user, the output legal information is to application system.Otherwise the output information unauthorized is to application system.Be used for principle illustrative experiment, password P=8.
Fig. 8 is user's mask artwork W1 of emulation experiment one, is of a size of 160 * 120.Fig. 9 is the visual cryptography subgraph W2 of emulation experiment one, is of a size of 160 * 120.The first alignment frame the measure-alike of frame that align with second all is 160 * 120, and i=1, j=1, i '=1, j '=1.The size of the first alignment frame, the second alignment frame, user's mask artwork W1, visual cryptography subgraph W2 is all identical, therefore the border of the first alignment frame, the second alignment frame, visual cryptography subgraph W2 all overlaps, covered the first alignment frame when in the second alignment frame, showing the visual cryptography subgraph.Figure 10 is the effect of the exploded view picture that obtains after user's mask artwork W1 in the emulation experiment one and visual cryptography subgraph W2 stack, as can be seen from the figure password P=199301.

Claims (2)

1. the one-time pad password system based on visual cryptography is characterized in that, comprises main control module, identity characteristic input interface, visual information display terminal, password input terminal, several user's mask artworks; Every corresponding user of user's mask artwork;
The identity characteristic input interface receives user's identity characteristic data input, sends to main control module; The password input terminal receives the password input, and sends to main control module;
The visual information display terminal receives the visual cryptography subgraph that main control module sends, and is shown to the user; User's mask artwork that the user will have is put on the first alignment frame, can obtain as time password P;
Main control module also comprises primary control program and database take computer system as platform, under the control of primary control program, and completing user registration and authentication identifying; Database storage user's mask artwork data and identity characteristic data;
When main control module is carried out user registration course: receive the identity characteristic data that the identity characteristic input interface sends, produce at random a width of cloth user mask artwork, deposit this user's mask artwork and user's identity characteristic data in database as this user's information together; Wherein, the process that produces a width of cloth user mask artwork is:
If six basic picture element matrixs are 0 0 1 1 , 0 1 0 1 , 0 1 1 0 , 1 1 0 0 , 1 0 1 0 , 1 0 0 1 , 0 pixel that represents black gray wherein, 1 represents the pixel of white gray;
As a foundation drawing point, then six basic picture element matrixs form six different foundation drawing points with each basic picture element matrix, and each foundation drawing point comprises 2 * 2 pixels; Choose at random any foundation drawing point and arrange, the image of generation is user's mask artwork; Each user allots user's mask artwork;
When main control module is carried out the authentication identifying, may further comprise the steps:
The first step: search user's mask artwork;
The identity characteristic input interface receives the user identity characteristic, and the identity characteristic data of storing in these identity characteristic data and the database are mated, and finds user's mask artwork W1 corresponding to this user identity feature;
Second step: generate associated picture;
(1) step: generate original image;
The random n position password that generates is designated as P, and wherein n is any positive integer;
If two original pixels matrixes are 1 1 1 1 , 0 0 0 0 ; As an original graph point, then two original pixels matrixes form two different original graph points with each original pixels matrix, and each original graph point comprises 2 * 2 pixels; Wherein 1 1 1 1 Represent the original graph point of white, 0 0 0 0 Represent the original graph point of black;
Generate original image, original image is the 0-1 gray level image; Utilize vision to observe and to obtain password P from original image;
If comprising the zone of password P in the original image is effective range, effective range to be expanded, the expansion rule is: if the pixel in the effective range is the white pixel point, then expand the original graph point that becomes white, namely 1 1 1 1 ; If the pixel in the effective range is black pixel point, then expand the original graph point that becomes black, namely 0 0 0 0 ; Effective range is expanded the rear image that forms be designated as effective image S;
(2) step: generate the visual cryptography subgraph;
At first user's mask artwork W1 and effective image S are alignd; The concept of definition alignment unit is: an alignment unit refers to any one foundation drawing point in user's mask artwork W1, and an alignment unit refers to any one original graph point in effective image S; The rule of alignment is: when user's mask artwork W1 and effective image S were stacked, all alignment unit of effective image S all covered in the alignment unit of user's mask artwork W1; If after user's mask artwork W1 and the effective image S alignment, the closed curve that the borderline pixel of user's mask artwork W1 forms is the first alignment frame; The closed curve that the borderline pixel of effective image S forms is the second alignment frame, records the size of relative position W and each alignment frame of two alignment frames; By relative position W as can be known, the original graph point of the capable j row of effective image S i covers on the foundation drawing point of user's mask artwork W1 the i ' row j ' row, and is namely corresponding;
If expand picture element matrix and be for five 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 , 0 0 0 0 , Each is expanded picture element matrix as an exploded view point, then expand five exploded view points of picture element matrix formation for five, each exploded view point comprises 2 * 2 pixels;
If ten resolve a picture dot matrixes are 0 0 1 1 , 0 1 0 1 , 0 1 1 0 , 1 1 0 0 , 1 0 1 0 , 1 0 0 1 , 0 0 0 1 , 0 0 1 0 , 0 1 0 0 , 1 0 0 0 ; As an exploded view point, then ten resolve a picture dot matrixes form ten exploded view points with each resolve a picture dot matrix, and each exploded view point comprises 2 * 2 pixels;
Utilize effective image S to generate the exploded view picture, the exploded view picture is made of the exploded view point, the create-rule of each exploded view point is: the original graph of the capable j row of effective image S i is put corresponding exploded view as the exploded view point of the capable j row of i, if the original graph point of the capable j row of effective image S i is the original graph point of white, then three pixels are black in the exploded view point of the capable j row of i, a pixel is white, and the position of white pixel point is in two white pixel point positions in foundation drawing point corresponding to user's mask artwork W1 the i ' row j ' row any one, chooses at random the white original graph point of qualified exploded view point replacement; Otherwise the original graph point of black is replaced to the exploded view point 0 0 0 0 ;
Recycling exploded view picture and user's mask artwork W1 generate visual cryptography subgraph W2; Visual cryptography subgraph W2 is made of the exploded view point, with the exploded view point in the exploded view point replacement exploded view picture, the replacement condition satisfies: when the value of the exploded view point corresponding pixel points that the capable j of the value of the foundation drawing point corresponding pixel points of user's mask artwork W1 the i ' row j ' row and visual cryptography subgraph W2 i is listed as multiplied each other, the result who obtains was the value of the corresponding pixel points of the exploded view point that is listed as of the capable j of exploded view picture correspondence i;
The 3rd step: check password;
The first alignment frame is presented at VDT, presses relative position W and in the second alignment frame, show the visual cryptography subgraph;
The user who receives the transmission of password input terminal enters password; If the password of input is P, judge that then the user is validated user, the output legal information is to application system; Otherwise the output information unauthorized is to application system.
2. the one-time pad password system based on visual cryptography according to claim 1 is characterized in that, the length of original image is half of length of user's mask artwork, and the width of original image is half of width of user's mask artwork.
CN 201110335563 2011-10-28 2011-10-28 One-time pad password system based on visual cryptography Expired - Fee Related CN102394751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110335563 CN102394751B (en) 2011-10-28 2011-10-28 One-time pad password system based on visual cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110335563 CN102394751B (en) 2011-10-28 2011-10-28 One-time pad password system based on visual cryptography

Publications (2)

Publication Number Publication Date
CN102394751A CN102394751A (en) 2012-03-28
CN102394751B true CN102394751B (en) 2013-09-18

Family

ID=45861960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110335563 Expired - Fee Related CN102394751B (en) 2011-10-28 2011-10-28 One-time pad password system based on visual cryptography

Country Status (1)

Country Link
CN (1) CN102394751B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468110B (en) * 2013-09-24 2018-09-28 阿里巴巴集团控股有限公司 Command identifying method, equipment and system
KR101817306B1 (en) * 2016-06-03 2018-01-11 (주)투비스마트 Appratus and method for authentication using visual cryptography
CN107178258A (en) * 2017-06-26 2017-09-19 西北民族大学 The electronic lock of view-based access control model password principle
CN111464512A (en) * 2020-03-18 2020-07-28 紫光云技术有限公司 Mobile phone token MFA scheme based on visual password
CN112134899A (en) * 2020-09-28 2020-12-25 嘉兴市嘉禾区块链技术研究院 Factory terminal control double identity authentication method based on vision and network security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717640A (en) * 2002-11-29 2006-01-04 皇家飞利浦电子股份有限公司 Key synchronization in an image cryptographic systems
CN1759416A (en) * 2003-03-11 2006-04-12 皇家飞利浦电子股份有限公司 Visual cryptography system
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password
US7667871B1 (en) * 2004-01-30 2010-02-23 Roskind James A Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0717502D0 (en) * 2007-09-08 2007-10-17 Unibyte Ltd Identification and recordal apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717640A (en) * 2002-11-29 2006-01-04 皇家飞利浦电子股份有限公司 Key synchronization in an image cryptographic systems
CN1759416A (en) * 2003-03-11 2006-04-12 皇家飞利浦电子股份有限公司 Visual cryptography system
US7667871B1 (en) * 2004-01-30 2010-02-23 Roskind James A Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password

Also Published As

Publication number Publication date
CN102394751A (en) 2012-03-28

Similar Documents

Publication Publication Date Title
Sun et al. A shoulder surfing resistant graphical authentication system
Naor et al. Visual authentication and identification
US20190260748A1 (en) Securing a transaction performed from a non-secure terminal
Hayashi et al. Use your illusion: secure authentication usable anywhere
CN102394751B (en) One-time pad password system based on visual cryptography
CN101183941B (en) Random concealed inquiry type cipher authentication technique
US9514316B2 (en) Optical security enhancement device
Papadopoulos et al. Illusionpin: Shoulder-surfing resistant authentication using hybrid images
CN102340402B (en) Identity authentication method based on visual cryptography
CN101739720B (en) Method and device for generating three-dimensional dynamic verification code
JP2006520047A (en) Method and system for enabling remote message creation
US20130042318A1 (en) Authentication System and Method Using Arrays
Lee et al. Here is your fingerprint! Actual risk versus user perception of latent fingerprints and smudges remaining on smartphones
CN102164137A (en) Strong authentication method based on dynamic mapping password
US9418215B2 (en) Optical security enhancement device
US20100228988A1 (en) Method and device for visual code transaction verification
CN101510875B (en) Identification authentication method based on N-dimension sphere
CN113255505A (en) Certificate photo generation method, device, equipment and storage medium
CN109388933A (en) Verification method, device, user equipment and storage medium based on dynamic subgraph
CN106650395A (en) Moire fringe-based confidential information display method
CN111131657A (en) Chaos medical image tamper-proof encryption method based on self-verification matrix
KR101188016B1 (en) Method for password input using vibration
CN109871722A (en) Auth method, system, terminal and storage medium based on optical picture shape code
CN105229656B (en) Optical safety enhances equipment
Kosugi et al. Swipass: Image-based user authentication for touch screen devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130918

Termination date: 20161028

CF01 Termination of patent right due to non-payment of annual fee